Welcome![Sign In][Sign Up]
Location:
Search - shamir secret sharing

Search list

[ExploitLibrary_of_Cryptographic

Description: a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.-a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.
Platform: | Size: 388055 | Author: 刘永 | Hits:

[Otherhowtosharesecret

Description: shamir的秘密分享机制的原文。秘密分享门限机制中,利用拉格朗日插值多项式来恢复。-shamir secret-sharing mechanism in the original language. Threshold secret sharing mechanism, the use of Lagrange polynomial interpolation to restore.
Platform: | Size: 184303 | Author: 黄海凌 | Hits:

[Crack Hacksecretshare_VC++

Description: Shamir秘密分享与恢复算法的VC++程序,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再得出主密钥。输入大数长度和份数可自行定义(默认是270位和不超过20份)。-Shamir secret sharing and recovery algorithm VC procedures, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then come to the main key. Length and the importation of large numbers of shares to be defined (the default is 270 and not more than 20).
Platform: | Size: 39140 | Author: linvg | Hits:

[Crack Hacksecretshare_java

Description: Shamir秘密分享算法的java实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then calculated the main key.
Platform: | Size: 4876 | Author: linvg | Hits:

[OS programLibrary_of_Cryptographic

Description: a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.-a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.
Platform: | Size: 388096 | Author: 刘永 | Hits:

[Otherhowtosharesecret

Description: shamir的秘密分享机制的原文。秘密分享门限机制中,利用拉格朗日插值多项式来恢复。-shamir secret-sharing mechanism in the original language. Threshold secret sharing mechanism, the use of Lagrange polynomial interpolation to restore.
Platform: | Size: 184320 | Author: 黄海凌 | Hits:

[Crack Hacksecretshare_VC++

Description: Shamir秘密分享与恢复算法的VC++程序,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再得出主密钥。输入大数长度和份数可自行定义(默认是270位和不超过20份)。-Shamir secret sharing and recovery algorithm VC procedures, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then come to the main key. Length and the importation of large numbers of shares to be defined (the default is 270 and not more than 20).
Platform: | Size: 1963008 | Author: linvg | Hits:

[Crack Hacksecretshare_java

Description: Shamir秘密分享算法的java实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then calculated the main key.
Platform: | Size: 5120 | Author: linvg | Hits:

[Windows Developsrc

Description: shamir‘s secret sharing C语言源码,对密码分割合并实现秘密共享-shamir' s secret sharing C language source code for the password secret sharing to achieve the combined partition
Platform: | Size: 245760 | Author: iuhiuh | Hits:

[Crack Hackssss_rk

Description: shamir密钥共享机制的c语言实现,分割合并密钥,实现密钥的共享-shamir secret sharing mechanisms to achieve the c language, division of the combined key and realize the sharing of key
Platform: | Size: 21504 | Author: iuhiuh | Hits:

[Crack HackShamir

Description: Shamir秘密分享算法的C#实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then calculated the main key.
Platform: | Size: 2179072 | Author: | Hits:

[Crack Hackshamir

Description: 基于拉格朗日插值的一个密钥共享策略——Shamir-A secret sharing strategy based on Lagrange interpolation- Shamir
Platform: | Size: 1458176 | Author: zhaobinnan | Hits:

[Crack HackRSA-SecretSharingScheme

Description: 于RsA密码体制,提出了一个新的(f,,1)门限秘密共享方案。在该方案中,秘密份额由各参与者自己 选择,秘密分发者不知道每个参与者所持有的份额,而且秘密份额长度与秘密长度相同。在秘密恢复过程中,每 个参与者能够验证其他参与者是否进行了欺骗。每个参与者只需维护一个秘密份额,就可以实现对多个秘密的共 享。方案的安全性是基于RSA密码体制和Shamir的(‘n)门限秘密共享方案的安全性。-Abstract:A new(f,n)thresh01d secret sharing scheme was proposed,which was based on RSA cryptosystem.1n出is scheme,each participallt’s secret shadow was selected by the panicipallt himself aIld even the secret dealer did not k110w aIlything about his secret shadow.A1l these shadows were as short as me secret to be shared.In me recoVery phase,each participaIlt was allowed to check whether another panicipaIlt pmvided me nlle infoⅡIlation or not.Each participaIlt call share many secrets with omer panicipants by holding only one shadow.The security of this scheme is the as mat of tlle RSA cryptosystem and Shamir’s(f,n)threshold secret sharing scheme.
Platform: | Size: 361472 | Author: 徐晓刚 | Hits:

[Crack HackShamir

Description: Shamir的(k,n)门限秘密共享方案 Shamir提出秘密共享概念的同时,也分别给出了(k,n)门限秘密共享体制的概念。简单地说,设秘密通过秘密共享算法分发给个成员共享,每一个成员持有一个子密钥也称为影子或秘密碎片,如果满足: (1)任何不少于k个的合格成员通过所持有的正确的碎片都可以重构。 (2)任何k个以下的成员集都无法重构。 称这种方案为(k,n)门限秘密共享方案,简称为门限方案,k称为方案的门限值。 作为各种秘密共享方案中最简单实用的门限秘密共享方案,(k,n)门限秘密共享方案也是这些方案中最具有代表性和广泛应用的方案。下面简单介绍一下这个方案 -Shamir' s (k, n) threshold secret sharing scheme Shamir proposed the concept of secret sharing, were also given (k, n) threshold secret sharing system concept. Simply set in secret by secret sharing algorithm distributed members share held by every member of a sub-key is also known as the shadow or secret debris, if: (1) any less than k qualified members through the correct fragmentation held can be reconstructed. (2) The members of any k sets can not be reconstructed. This scheme (k, n) threshold secret sharing scheme, referred to as the threshold scheme, k is called the threshold of the program. As secret sharing scheme in the most simple and practical door threshold secret sharing scheme (k, n) threshold secret sharing scheme is also the most representative and widely used programs such programs. Following is a brief look at this program
Platform: | Size: 214016 | Author: zzq | Hits:

[Crack Hacktiqushuju

Description: 经过shamir秘密共享后的秘密提取,其中有秘密比特的提取代码。-After shamir secret sharing secret after extraction, in which there is a secret code to extract bits.
Platform: | Size: 1024 | Author: 夏彬彬 | Hits:

[CSharpsecretsharp-code-14

Description: Secret Sharp是一个独特的安全工具,使您可以加密短小的基于文本的秘密,只能与两个或两个以上的密钥解密,这基本上作为密码。-Secret Sharp is a wizard based GUI for the Shamir Secret Sharing Algorithm provided by the crypto++ API. Secret Sharp replicates the functionality that ssss provides on unix.
Platform: | Size: 476160 | Author: Raymond Ho | Hits:

[Crack HackShamir's Secret Sharing-JavaScript

Description: Shamir's Secret Sharing 秘密分享使用JavaScript实现(Shamir's Secret Sharing Secret Sharing USES JavaScript implementation)
Platform: | Size: 2048 | Author: hkkhuang | Hits:

[Crack HackShamir Secret Sharing

Description: shamir secret sharing加解密实现(shamir secret sharing encryption)
Platform: | Size: 27648 | Author: masitian | Hits:

[OtherShamir

Description: this is one of the secret share algorithm...for encrypting cloud data(this is one of the secret share algorithm...)
Platform: | Size: 5120 | Author: sulabam | Hits:

[Crack Hack基于Shamir秘密共享的云端多副本审计

Description: 基于Shamir秘密共享的云端多副本数据持有性审计-20150605 基于Shamir秘密共享的云端多副本数据持有性审计-20150605(Cloud multi replica data holding audit -20150605 based on Shamir secret sharing)
Platform: | Size: 668672 | Author: 123wdw | Hits:
« 12 »

CodeBus www.codebus.net